The Abolishment of the Right to Privacy?
The USA, Mass Surveillance and the Spiral Model- Authors:
- Series:
- Tectum - Masterarbeiten
- Publisher:
- 05.02.2018
Summary
This book aims to explain the US violation of the human right to privacy unveiled by Edward Snowden with a newly developed comprehensive spiral model. After analyzing the social and juridical roots of the norm of privacy, it portrays the countering of privacy by the security norm in the US public debate and the US policy from the 1930s to 2013. On the basis of this case study the author refines the spiral model invented by Risse et al. Finally, the book explores the reaction of several actors following the Snowden disclosures and analyzes the tools these actors have used to influence the behavior of the USA. Thereby the author examines if the US reactions to the Snowden disclosures since 2013 follow the heuristic approach of the spiral model.
Search publication
Bibliographic data
- Copyright year
- 2018
- Publication date
- 05.02.2018
- ISBN-Print
- 978-3-8288-4034-8
- ISBN-Online
- 978-3-8288-6750-5
- Publisher
- Tectum, Baden-Baden
- Series
- Tectum - Masterarbeiten
- Language
- German
- Pages
- 162
- Product type
- Book Titles
Table of contents
- Titelei/Inhaltsverzeichnis Partial access Pages I - VIII Download chapter (PDF)
- 1. Introduction No access Pages 1 - 6
- 2. The Spiral Model No access Pages 7 - 12
- 3.1. Privacy as Social Norm No access
- 3.2. Privacy as Juridical Norm No access
- 3.3. Privacy as International Norm No access
- 3.4. Cultural Differences: the USA and the EU No access
- 4.1. Surveillance, Security and Privacy No access
- 4.2. From Roosevelt to the Church Committee No access
- 4.3. From Reagan to 9/11 No access
- 4.4. After 9/11 No access
- 4.5. Foreign Surveillance No access
- 4.6. The USA and a Comprehensive Spiral Model No access
- 5.1. Liberal states No access
- 5.2.1. United Nations No access
- 5.2.2. European Union No access
- 5.2.3. Council of Europe No access
- 5.3. (International) Non-Governmental Organizations: Amnesty International No access
- 6. The US Response: Does the Spiral Model Work? No access Pages 129 - 136
- 7. Conclusion: Privacy – a Dead Norm? No access Pages 137 - 142
- Bibliography No access Pages 143 - 162
Bibliography (249 entries)
No match found. Try another term.
- Bibliography Open Google Scholar
- Abu-Laban, Yasmeen (2014): The politics of surveillance. Civil liberties, human rights and ethics, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 420�427. Open Google Scholar
- Adler, David Gray (2008): George Bush, the unitary executive and the Constitution, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 99�119. Open Google Scholar
- Agamben, Giorgio (2015): Die Geburt des Sicherheitsstaats, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 7�9. Open Google Scholar
- Aid, Mattew (2009): The Secret Sentry. The Untold History of the National Security Agency, New York: Bloomsbury Press. Open Google Scholar
- Aiken, Katherine (2008): Senator Church and his constituents, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 76�95. Open Google Scholar
- Altmann, Irwin (1977): Privacy Regulation: Culturally Universal or Culturally Specific?, in: Journal of Social Issues, Vol. 33, No. 3, pp. 66�84. Open Google Scholar
- American Civil Liberties Union (2015): ACLU V. Clapper � Challenge to NSA Mass Call-Tracking Program, available at: https://www.aclu.org/cases/aclu-v-clapper-challenge-nsa-mass-call-tracking-program [accessed: 05/25/2016]. Open Google Scholar
- American Civil Liberties Union (2001): In Defence of Freedom in a Time of Crisis, available at: https://www.aclu.org/defense-freedom-time-crisis [accessed: 04/19/16]. Open Google Scholar
- American Civil Liberties Union (n.d.): Court battles, available at: https://www.aclu.org/defending-our-rights/court-battles?topics=132 [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (2016a): Amnesty International Report 2015/16. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (2016b): Amnesty International State of the World 2015�2016, available at: http://www.amnestyusa.org/research/reports/amnesty-international-state-of-the-world-2015-2016?page=show [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (2015a): Global opposition to USA big brother mass surveillance, 03/18/2015, available at: https://www.amnesty.org/en/latest/news/2015/03/global-opposition-to-usa-big-brother-mass-surveillance/ [accessed: 05/34/2016]. Open Google Scholar
- Amnesty International (2015b): Global Surveillance Operations and the Risk to Human Rights, 06/06/2015, available at: http://www.amnestyusa.org/pdfs/AIUSA_GlobalSurveillanceBoardLetter_20150606.pdf [accessed: 05/24/2016]. Open Google Scholar
- Amnesty International (2015c): Amnesty International Report 2014/15. The State of the World�s Human Rights, available at: https://www.amnesty.org/en/latest/research/2016/02/annual-report-201516/ [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (2014): New tool for spy victims to detect government surveillance, 11/20/2014, available at: https://www.amnesty.org/en/latest/news/2014/11/new-tool-spy-victims-detect-government-surveillance/ [accessed: 05/24/2016]. Open Google Scholar
- Amnesty International (2013): The US NSA and the UK GCHQ want to listen in on all: Time for the Human Rights Council to discuss their activities: Amnesty International written statement to the 24th session of the UN Human RightsCouncil (9 to 27 September 2013), 08/29/2013, AI index: IOR 41/018/2013. Open Google Scholar
- Amnesty International (n.d.a): Stand Up For Our Rights Online!, available at: http://act.amnestyusa.org/ea-action/action?ea.client.id=1839&ea.campaign.id=36747 [accessed: 05/24/2016]. Open Google Scholar
- Amnesty International (n.d.b): Does your country share your data with the USA?, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/does-your-country-share-your-data-with-the-usa/ [accessed: 05/24/2016]. Open Google Scholar
- Amnesty International (n.d.c): Human Rights and National Security, available at: http://www.amnestyusa.org/our-work/issues/security-and-human-rights [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (n.d.d): Suchbegriffe, available at: http://www.amnesty.de/suche?words-advanced=Folter&search.x=0&search.y=0&search=Suchen&country=&topic=&node_type=ai_journal_story&from_month=6&from_year=2013&to_month=4&to_year=2016&sort_type=desc&page_limit=10&form_id=ai_search_form#resultlist [accessed: 05/25/2016]. Open Google Scholar
- Amnesty International (n.d.e): Brosch�ren, available at: https://www.amnesty.de/2010/9/26/broschueren?destination=node%2F16659 [accessed: 05/25/2016] Open Google Scholar
- Amnesty Internaional et al. (n.d.): Reset the net, available at: https://www.resetthenet.org [accessed: 05/24/2016]. Open Google Scholar
- Amnesty International/Privacy International (2015): Two years after Snowden, available at: https://www.amnesty.org/en/documents/act30/1795/2015/en/ [accessed: 05/25/2016]. Open Google Scholar
- Ashby, LeRoy (2008): The Church Committee�s history and relevance. Reflecting on Senator Church, in: US National Security, Intelligence and Democracy. From Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 57�75. Open Google Scholar
- Atkinson, L. Rush (2015): Regulating the Surveillance State, Upstream and Down: A Law & Economics Approach to the Intelligence Framework and Proposed Reforms, in: Stanford Journal of International Law, Vol. 51, No.1, pp. 1�18. Open Google Scholar
- Bamford, James (2009): The Shadow Factory. The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Anchor Books. Open Google Scholar
- Beaumont, Ben (2015a): Edward Snowden: �I should have come forward sooner,� 06/04/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/06/edward-snowden-i-should-have-come-forward-sooner/ [accessed: 05/24/2016]. Open Google Scholar
- Beaumont, Ben (2015b): 7 reasons why �I�ve got nothing to hide� is the wrong response to mass surveillance, 04/29/2015, available at: https://www.amnesty.org/en/latest/campaigns/2015/04/7-reasons-why-ive-got-nothing-to-hide-is-the-wrong-response-to-mass-surveillance/ [accessed: 05/24/2016]. Open Google Scholar
- Beck, Ulrich (1986): Risikogesellschaft. Auf dem Weg in eine andere Moderne, Frankfurt a.M.: Suhrkamp Open Google Scholar
- Bedan, Matt (2007): Echelon�s Effect: The Obsolescence of the US Foreign Intelligence Legal Regime, in: Federal Communications Law Journal, Vol. 59, No. 2, pp. 425�444. Open Google Scholar
- Bennett, Colin (2014): Privacy advocates, privacy advocacy and the surveillance society, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 412�419. Open Google Scholar
- Bennett, Colin (2011): Storming the Barricades so We Can All Be Private Together: Everyday Surveillance and the Politics of Privacy Advocacy, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: Springer VS Verlag, pp. 299�320. Open Google Scholar
- Bennett, Colin (1992): Regulating Privacy. Data Protection and Public Policy in Europe and the United States, Ithaca: Cornell University Press. Open Google Scholar
- Biermann, Kai (2017a): Was der NSA-Ausschuss erreicht hat und was nicht, in: Zeit online, 06/28/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/ueberwachungsaffaere-nsa-untersuchungsausschuss-abschlussbericht-faq/komplettansicht [accessed: 09/05/2017]. Open Google Scholar
- Biermann, Kai (2017b): Opposition wirft Regierung L�ge vor, in: Zeit online, 06/19/2017, available at: http://www.zeit.de/politik/deutschland/2017-06/nsa-untersuchungsausschuss-bnd-abschlussbericht-opposition [accessed: 09/05/2017]. Open Google Scholar
- Biermann, Kai (2017c): Selbstherrliche �berwachung soll Gesetz werden, in: Zeit online, 06/07/2017, available at: http://www.zeit.de/politik/deutschland/2016-06/nsa-bnd-verfassungsschutz-ueberwachung-gesetz-entwurf/komplettansicht [accessed: 09/05/2017]. Open Google Scholar
- Blum, Stephanie Cooper (2009): What Really is at Stake with the FISA Amendments Act of 2008 and Ideas for Future Surveillance Reform, in: Boston University Public Interest Law Journal, Vol. 2, pp. 269�314. Open Google Scholar
- Bogart, William (2014): Simulation and post-panopticism, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 30�37. Open Google Scholar
- Boghosian, Heidi (2013): Spying on Democracy. Government Surveillance, Corporate Power, and Public Resistance, San Francisco: City Lights Books. Open Google Scholar
- Brivot, Marion/Yves Gendron (2011): Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting, in: Accounting, Organizations and Society, Vol. 36, No. 3, pp. 135�155. Open Google Scholar
- Brown, Ian/Morton Halperin/Ben Hayes et al. (2017): Toward Multilateral Standards for Foreign Surveillance Reform, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 461�491. Open Google Scholar
- Brown, Ian (2013): Anforderung an die Erm�chtigung zur rechtm��igen Abh�rung, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckedahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 206�213. Open Google Scholar
- Buckley, John (2014): Managing Intelligence. A Guide to Law Enforcement Professionals, Boca Raton: CRC Press. Open Google Scholar
- Bunz, Mercedes: Vom Speicher zum Verteiler. Die Geschichte des Internet, Berlin: Kadmos. Open Google Scholar
- Bygrave, Lee A. (2010): Privacy and Data Protection in an International Perspective, in: Scandinavian Studies in Law, Vol. 56, pp. 165�200. Open Google Scholar
- Cate, Fred H. (2015): Edward Snowden and the NSA: Law, Policy, and Politics, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 26�44. Open Google Scholar
- Ceyhan, Ayse (2014): Surveillance as biopower, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 38�45. Open Google Scholar
- Chaos Computer Club (n.d.): Chaos Computer Club, available at: https://www.ccc.de/en/home [accessed: 01/20/2016]. Open Google Scholar
- Chesterman, Simon (2011): One Nation Under Surveillance. A New Social Contract to Defend Freedom Without Sacrificing Liberty, Oxford: Oxford University Press. Open Google Scholar
- Chinese National Ministry of Defense (2014): Statement on U.S. Indictment of Chinese Military Officers, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, p. 165. Open Google Scholar
- Christie, George (1972): Government Surveillance and Individual Freedom: A Proposed Statutory Response to Laird vs. Tatum and the Broader Problem of Government Surveillance of the Individual, in: New York University Law Review, Vol. 47, pp. 871�902. Open Google Scholar
- Clarke, Roger (1988): Information Technology and Dataveillance, in: Communications of the Association for Computing Machinery, Vol. 31, No. 5, pp. 498�512. Open Google Scholar
- Cohn, Cindy/Rainey Reitman (2015): USA Freedom Act Passes: What We Celebrate, What We Mourn, and Where We Go From Here, 06/02/2015, available at: https://www.eff.org/deeplinks/2015/05/usa-freedom-act-passes-what-we-celebrate-what-we-mourn-and-where-we-go-here [accessed: 05/29/2016]. Open Google Scholar
- Cole, David (2003): The new McCathyism: Repeating History in the War on Terrorism, in: Harvard Civil Rights-Civil Liberties Law Journal, Vol. 38, No. 1, pp. 1�30. Open Google Scholar
- Commissioner of Human Rights (2016): Memorandum on surveillance and oversight mechanisms in the United Kingdom, 05/16/2016, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2919538&SecMode=1&DocId=2375752&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
- Commissioner of Human Rights (2015): Democratic and effective oversight of national security services, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2796355&SecMode=1&DocId=2286978&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
- Commissioner of Human Rights (2014): The rule of law on the Internet and in the wider digital world, available at: https://wcd.coe.int/com.instranet.InstraServlet?command=com.instranet.CmdBlobGet&InstranetImage=2734552&SecMode=1&DocId=2262340&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
- Commissioner of Human Rights (2008): Protecting the Right to Privacy in the Fight Against Terrorism, available at: https://wcd.coe.int/com.instranet.InstraServlet?Index=no&command=com.instranet.CmdBlobGet&InstranetImage=1416463&SecMode=1&DocId=1426260&Usage=2 [accessed: 05/23/2016]. Open Google Scholar
- Connolly, Kate (2015): German secret service BND reduces cooperation with NSA, in: The Guardian, 05/07/2015, available at: http://www.theguardian.com/world/2015/may/07/german-secret-service-bnd-restricts-cooperation-nsa-us-online-surveillance-spy [accessed: 05/14/2016]. Open Google Scholar
- Conyers, John (2009): Reining in the Imperial Presidency. Lessons and Recommendations Relating to the Presidency of George W. Bush. House Committee on the Judiciary Majority Staff Report to Chairman John C. Conyers, Jr., New York: Skyhorse Publishing. Open Google Scholar
- Cope, Sophia (2016): House Advances Email Privacy Act, Setting the Stage for Vital Privacy Reform, 04/27/2016, available at: https://www.eff.org/deeplinks/2016/04/house-advances-email-privacy-act-setting-stage-vital-privacy-reform [accessed: 05/29/2016]. Open Google Scholar
- Council of Europe (2016a): Recommendation CM/Rec(2016)5[1] of the Committee of Ministers to member States on Internet freedom, 04/13/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016806415fa [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (2016b): Internet Governance � Council of Europe Strategy 2016�2019. Democracy, human rights and the rule of law in the digital world, 03/30/2016, available at: https://search.coe.int/cm/Pages/result_details.aspx?ObjectId=09000016805c1b60 [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (2015a): Mass surveillance, Resolution 2045, 04/21/2015, available at: http://assembly.coe.int/nw/xml/XRef/Xref-XML2HTML-en.asp?fileid=21692&lang=en [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (2015b): Improving the protection of whistleblowers, Resolution 2060, 06/23/2015, available at: http://semantic-pace.net/tools/pdf.aspx?doc=aHR0cDovL2Fzc2VtYmx5LmNvZS5pbnQvbncveG1sL1hSZWYvWDJILURXLWV4dHIuYXNwP2ZpbGVpZD0yMTkzMSZsYW5nPUVO&xsl=aHR0cDovL3NlbWFudGljcGFjZS5uZXQvWHNsdC9QZGYvWFJlZi1XRC1BVC1YTUwyUERGLnhzbA==&xsltparams=ZmlsZWlkPTIxOTMx [accessed: 05/23/2015] Open Google Scholar
- Council of Europe (2013a): Council of Europe alerts governments on risks of digital tracking and surveillance, 06/12/2013, available at: https://go.coe.int/phA5g [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (2013b): Council of Europe ministerial conference calls for effective safeguards against electronic mass surveillance, 11/08/2013, available at: https://go.coe.int/bjrvF [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (2001): Additional Protocol to the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data regarding supervisory authorities and transborder data flows, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680080626 [accessed: 01/20/2016]. Open Google Scholar
- Council of Europe (1981): Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, available at: http://www.coe.int/de/web/conventions/full-list/-/conventions/rms/0900001680078b37 [accessed: 01/19/2016]. Open Google Scholar
- Council of Europe (n.d.a): European Convention on Human Rights, available at: http://www.echr.coe.int/Documents/Convention_ENG.pdf [accessed: 01/19/2016]. Open Google Scholar
- Council of Europe (n.d.b): Ad Hoc Committee on Data Protection (CAHDATA), available at: http://www.coe.int/t/dghl/standardsetting/dataprotection/Cahdata_en.asp [accessed: 05/23/2016]. Open Google Scholar
- Council of Europe (n.d.c): United States � Observer, available at: http://www.coe.int/en/web/portal/united-states [accessed: 05/23/2016]. Open Google Scholar
- Cullather, Nick (2015): Security and Liberty: The Imaginary Balance, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 19�25. Open Google Scholar
- Daase, Christopher/Tim Nicholas R�hlig (2016): Der Wandel der Sicherheitskultur nach 9/11, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 13�34. Open Google Scholar
- Der Spiegel (1971): EDV im Odenwald, No. 20, p. 88, available at: http://www.spiegel.de/spiegel/print/d-43176393.html [accessed: 01/26/2016]. Open Google Scholar
- Deutscher Bundestag (2017): Beschlussfassung und Bericht des 1. Untersuchungsausschusses nach Artikel 44 des Grundgesetzes, Vorabfassung, 06/23/2017, Drucksache 18/12850, available at: http://dip21.bundestag.de/dip21/btd/18/128/1812850.pdf [accessed: 09/05/2017]. Open Google Scholar
- Diffie, Whitfield/Susan Landau (2007): Privacy on the Line. The Politics of Wiretapping and Encryption, Massachusetts: MIT Press. Open Google Scholar
- Doherty, Thomas (2003): Cold War, Cool Medium. Television, McCarthyism, and American Culture, New York: Columbia University Press. Open Google Scholar
- Dycus, Stephen (2008): Domestic military intelligence activities, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 163�183. Open Google Scholar
- Electronic Frontier Foundation (n.d.a): About EFF, available at: https://www.eff.org/about [accessed: 02/20/2015]. Open Google Scholar
- Electronic Frontier Foundation (n.d.b): Timeline of NSA Domestic Spying, available at: https://www.eff.org/nsa-spying/timeline [accessed: 05/04/2016]. Open Google Scholar
- Electronic Frontier Foundation (n.d.c): All EFF�s legal cases, available at: https://www.eff.org/cases [accessed: 05/25/2016]. Open Google Scholar
- Electronic Privacy Information Center (n.d.): About EPIC, available at: https://epic.org/epic/about.html [accessed: 02/20/2015]. Open Google Scholar
- Elliff, John (1984): Attorney General�s Guidelines for FBI Investigations, in: Cornell Law Review, Vol. 69, No. 4, pp. 785�815. Open Google Scholar
- Elmer, Greg (2014): Panopticon � discipline � control, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 21�29. Open Google Scholar
- Enn�ckl, Daniel (2014): Der Schutz der Privatsph�re in der elektronischen Datenverarbeitung, Wien: Verlag �sterreich. Open Google Scholar
- European Data Protection Supervisor (2016): EDPS starts work on a New Digital Ethics, 01/26/2016, Press Release No. EPDS/2016/05, available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2016/EDPS-2016-05-EDPS_Ethics_Advisory_Group_EN.pdf [accessed: 05/20/2016]. Open Google Scholar
- European Data Protection Supervisor (n.d.): Ethics Advisory Group, available at: https://secure.edps.europa.eu/EDPSWEB/edps/EDPS/Ethics [accessed: 05/20/2016]. Open Google Scholar
- European Parliament (2014): European Parliament resolution of 12 March 2014 on the US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� fundamental rights and on transatlantic cooperation in Justice and Home Affairs, 03/12/2014, EU Doc. P7_TA(2014)0230, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2014-0230+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Open Google Scholar
- European Parliament (2013): European Parliament resolution of 4 July 2013 on the US National Security Agency surveillance programme, surveillance bodies in various Member States and their impact on EU citizens� privacy, 07/04/2013, EU Doc. P7_TA(2013)0322, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+TA+P7-TA-2013-0322+0+DOC+PDF+V0//EN [accessed: 05/19/2016]. Open Google Scholar
- European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system), 07/11/2001, EU Doc. A5-0264/2001, available at: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//EN#_part5_def3 [accessed: 04/29/2016]. Open Google Scholar
- European Union (2016): Directive 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA, in: Official Journal of the European Union, L 119, 05/04/2016, pp. 0089�0131, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&rid=2 [accessed: 05/19/2016]. Open Google Scholar
- European Union (2012): Charter of Fundamental Rights of the European Union, available at: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT [accessed: 01/21/2016]. Open Google Scholar
- European Union (1995): Directive 95/46/EC of the European Parliament and of the Open Google Scholar
- Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, in: Official Journal of the European Union, L 281, 11/23/1995, pp. 0031�0050, available at: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML [accessed: 01/19/2016]. Open Google Scholar
- Fidler, David (ed.) (2015a): The Snowden Reader, Bloomington: Indiana University Press. Open Google Scholar
- Fidler, David (2015b): U.S. Foreign Policy and the Snowden Leaks, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 52�69. Open Google Scholar
- Finnemore, Martha/Kathryn Sikkink (1998): International Norm Dynamics and Political Change, in: International Organization, Vol. 53, No. 4, pp. 887�917. Open Google Scholar
- Foerstel, Herbert (2008): The Patriot Act. A Documentary and Reference Guide, Westport: Greenwood Press. Open Google Scholar
- Forsythe, David (2002): The United States and International Criminal Justice, in: Human Rights Quarterly, Vol. 24, No. 4, pp. 974�991. Open Google Scholar
- Gamson, William/David Meyer (1996): Framing Political Opportunity, in: Comparative Perspectives on Social Movements: Political Opportunities, Mobilizing Structures, and Cultural Framings, Dough McAdam et al. (eds.), Cambridge: Cambridge University Press, pp. 275�290. Open Google Scholar
- Garstka, Hansj�rgen (2003): Informationelle Selbstbestimmung und Datenschutz. Das Recht auf Privatsph�re, in: B�rgerrechte im Netz, Christiane Schulzki-Haddouti (ed.), pp. 48�70. Open Google Scholar
- Gathmann, Florian (2013): Eklat um Evo Morales: Pr�sidentenjet verl�sst Wien nach Zw�lf-Stunden-Stopp, in: Spiegel Online, 07/03/2013, available at: http://www.spiegel.de/politik/ausland/morales-flugzeug-in-wien-gestoppt-snowden-nicht-an-bord-a-909146.html [accessed: 05/28/2016]. Open Google Scholar
- Gebauer, Matthias et al. (2013): Berlin Leaves Biggest NSA Questions Unanswered, in: Spiegel Online, 07/29/2013, available at: http://www.spiegel.de/international/world/german-government-responds-to-nsa-spying-and-data-collection-leaks-a-913635.html [accessed: 05/16/2016]. Open Google Scholar
- Gellman, Barton (2013): U.S. surveillance architecture includes collection of revealing Internet, phone metadata, in: The Washington Post, 06/16/2013, available at: https://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_print.html [accessed: 05/04/2016]. Open Google Scholar
- Gellman, Barton/Laura Poitras (2013): U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, in: The Washington Post, 06/07/2013, available at: https://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1 [accessed: 04/28/2016]. Open Google Scholar
- Gibbs, Samuel (2016): Data regulators reject EU-US Privacy Shield safe harbour deal, in: The Guardian, 04/14/2016, available at: https://www.theguardian.com/technology/2016/apr/14/data-regulators-reject-eu-us-privacy-shield-safe-harbour-deal [accessed: 05/19/2016]. Open Google Scholar
- Gibbs, Samuel (2015): What is �safe harbour� and why did the EUCJ just declare it invalid?, in: The Guardian, 10/06/2015, available at: https://www.theguardian.com/technology/2015/oct/06/safe-harbour-european-court-declare-invalid-data-protection [accessed: 05/19/2016]. Open Google Scholar
- Gill, Peter (2015): World Society under Surveillance, in: Global Trends: Prospects for World Society, Stiftung Entwicklung und Frieden (ed.), pp. 71�86. Open Google Scholar
- Gilliom, John/Torin Monahan (2014): Everyday resistance, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 405�411. Open Google Scholar
- Giugni, Marco (2009): Political Opportunities: From Tilly to Tilly, in: Swiss Political Science Review, Vol. 15, No. 2, pp. 361�368. Open Google Scholar
- Glancy, Dorothy (1979): The Invention of the Right to Privacy, in: Arizona Law Review, Vol. 21, No. 1, pp. 1�39. Open Google Scholar
- Glendon, Mary Ann (2002): A World Made New. Eleanor Roosevelt and the Universal Declaration of Human Rights, New York: Random House. Open Google Scholar
- Global Privacy Enforcement Network (n.d.): Action Plan for the Global Privacy Enforcement Network (GPEN), available at: https://www.privacyenforcement.net/about_the_network#action_plan [accessed: 01/20/2016]. Open Google Scholar
- Goos, Kerstin et al. (2015): The co-evolution of surveillance technologies and surveillance practices, in: Surveillance in Europe, David Wright/Reinhard Kreissl (ed.), New York: Routledge, pp. 51�100. Open Google Scholar
- Gorman, Siobhan/Evan Perez/Janet Hook (2013): U.S. Collects Vast Data Trove, in: The Wall Street Journal, 06/07/2013, available at: http://www.wsj.com/articles/SB10001424127887324299104578529112289298922 [accessed: 04/27/2016]. Open Google Scholar
- Greenberg, Andy (2017): Passing the Email Privacy Act Has Never Been More Urgent, in: Wired, 02/06/2017, available at: https://www.wired.com/2017/02/trump-power-email-privacy-act-never-urgent/ [accessed: 09/06/2017]. Open Google Scholar
- Greenberg, Andy (2014): These Are the Emails Snowden Sent to First Introduce His Epic NSA Leaks, in: Wired, 10/13/2014, available at: https://www.wired.com/2014/10/snowdens-first-emails-to-poitras/ [accessed: 05/28/2016]. Open Google Scholar
- Greenberg, Andy (2013): Watch Top US Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year, in: Forbes, 06/06/2013, available at: http://www.forbes.com/sites/andygreenberg/2013/06/06/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos/#6c8b4e1021d3 [accessed: 04/27/2016]. Open Google Scholar
- Greenberg, Ivan (2010): The Dangers of Dissent. The FBI and Civil Liberties since 1965, New York: Lexington. Open Google Scholar
- Greenlee, Michael (2008): National security letters and intelligence oversight, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 184�204. Open Google Scholar
- Greenwald, Glenn (2013a): NSA collecting phone records of millions of Verizon customers daily, in: The Guardian, 06/06/2013, available at: http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order [accessed: 04/27/2016]. Open Google Scholar
- Greenwald, Glenn (2013b): NSA collected US email records in bulk for more than two years under Obama, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama [accessed: 04/28/2016]. Open Google Scholar
- Greenwald, Glenn/Spancer Ackerman (2013): Now the NSA is still harvesting your online data, in: The Guardian, 06/27/2013, available at: http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection [accessed: 05/04/2016]. Open Google Scholar
- Haas, Michael (2014): International Human Rights. A Comprehensive Introduction, New York: Routledge. Open Google Scholar
- Hager, Nicky (2015): Wie die NSA in die Welt kam, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 10�17. Open Google Scholar
- Haggerty, Kevin/Richard Ericson (2000): The surveillant assemblage, in: British Journal of Sociology, Vol. 51, No. 4, pp. 605�622. Open Google Scholar
- Harper, Nick (2014): FISA�s Fuzzy Line between Domestic and International Terrorism, in: The University of Chicago Law Review, Vol. 81, No. 3, pp. 1123-1164. Open Google Scholar
- Harris, Shane (2010): The Watchers. The Rise of America�s Surveillance State, New York: Penguin Press. Open Google Scholar
- Hart, Gary (2008): Liberty and security, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 13�21. Open Google Scholar
- Hegemann, Hendrik/Martin Kahl (2016): Konstruktionen und Vorstellungen von Wirksamkeit in der Antiterror-Politik: Eine kritische Betrachtung, in: Innere Sicherheit nach 9/11. Sicherheitsbedrohungen und (immer) neue Sicherheitsma�nahmen?, Susanne Fischer/Carlo Masala (eds.), Wiesbaden: Springer VS Verlag, pp. 189�207. Open Google Scholar
- Hei�ler, Julian (2017): Ein bisschen Aussp�hen unter Freunden, in: tagesschau.de, 10/21/2017, available at: https://www.tagesschau.de/inland/bnd-gesetz-reform-103.html [accessed: 09/05/2017]. Open Google Scholar
- Heller, Regina/Martin Kahl/Daniela Pisoiu (2012): The �dark� side of normative argumentation � The case of counterterrorism policy, in: Global Constitutionalism, Vol. 1, No. 2, pp. 278�312. Open Google Scholar
- Hempel, Leon/Susanne Krasmann/Ulrich B�ckling (2011): Sichtbarkeitsregime: Eine Einleitung, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 7�24. Open Google Scholar
- Holt, Jennifer/Steven Malcic (2015): The Privacy Ecosystem. Regulating Digital Identity in the United States and European Union, in: Journal of Information Policy, Vol. 5, pp. 155�178. Open Google Scholar
- Horowitz, Sarah (2017): Foucault�s Panopticon. A Model for NSA Surveillance?, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 39�62. Open Google Scholar
- Jansen, Jonas (2015): So k�nnen Sie nachpr�fen, ob Sie ausgesp�ht wurden, in: Frankfurter Allgemeine Zeitung, 02/19/2015, available at: http://www.faz.net/aktuell/feuilleton/debatten/privacy-international-zeigt-ueberwachung-durch-gchq-13437376.html [accessed: 02/20/2015]. Open Google Scholar
- Johnson, Brittany May (2016): Foreign National�s Privacy Interests Under U.S. Foreign Intelligence Law, in: Texas International Law Journal, Vol. 51, No. 2, pp. 229�257. Open Google Scholar
- Johnson, Loch (2008): Establishment of modern intelligence accountability, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 37�56. Open Google Scholar
- Kammerer, Dietmar (2015): Absolut unamerikanisch. Die schleichende Enteignung der Privatsph�re in den USA, in: Die �berwacher. Prism, Google, Whistleblower, Edition Le Monde diplomatique No. 16, Dorothee d�Aprile (ed.), pp. 28�32. Open Google Scholar
- Katzenstein, Peter (1996): The Culture of National Security. Norms and Identity in World Politics, New York: Columbia University Press. Open Google Scholar
- Keck, Margaret/Kathryn Sikkink (1998): Activists beyond Borders. Advocacy Networks in International Politics, Ithaca: Cornell University Press. Open Google Scholar
- Kerr, Orin (2001): The Fourth Amendment in Cyberspace: Can Encryption Create a �Reasonable Expectation to Privacy?�, in: Connecticut Law Review, Vol. 33, No. 503, pp. 503�533. Open Google Scholar
- Kietz, Daniela/Johannes Thimm (2013): Zwischen �berwachung und Aufkl�rung. Die amerikanische Debatte und die europ�ische Reaktion auf die Praxis der NSA, SWP-Aktuell, No. 51. Open Google Scholar
- Kittlitz, Alard von (2010): Der Traum von einem idealen Leben, in: Frankfurter Allgemeine Zeitung, 08/06/2010, available at: http://www.faz.net/aktuell/feuilleton/debatten/digitales-denken/ende-der-privatsphaere-der-traum-von-einem-idealen-leben-11026194.html [accessed: 06/09/2016]. Open Google Scholar
- Krasmann, Susanne (2011): Der Pr�ventionsstaat im Einvernehmen. Wie Sichtbarkeitsregime stillschweigend Akzeptanz produzieren, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 53�70. Open Google Scholar
- Krieger, Wolfgang (2014): Geschichte der Geheimdienste. Von den Pharaonen bis zur NSA, M�nchen: C.H. Beck. Open Google Scholar
- Kurz, Constanze (2016): Wir erkl�ren den Cyber War f�r er�ffnet, in: Frankfurter Allgemeine Zeitung, 03/07/16, available at: http://www.faz.net/aktuell/feuilleton/aus-dem-maschinenraum/amerika-erklaert-dem-is-den-ersten-cyberwar-14109024.html [accessed: 04/18/16]. Open Google Scholar
- Lee, Newton (2015): Counterterrorism and Cybersecurity. Total Information Awareness, Heidelberg: Springer. Open Google Scholar
- Liese, Andrea (2009): Exceptional Necessity. How Liberal Democracies Contest the Prohibition of Torture and Ill-Treatment when Countering Terrorism, in: Journal of International Law and International Relations, Vol. 5, No. 1, pp. 17�47. Open Google Scholar
- Liptak, Adam (2013): Justices Turn Back Challenge to Broader US Eavesdropping, in: The New York Times, 02/26/2013, available at: http://www.nytimes.com/2013/02/27/us/politics/supreme-court-rejects-challenge-to-fisa-surveillance-law.html?_r=0 [accessed: 05/24/2016]. Open Google Scholar
- Lynch, Andrew/Nicola McGarrity/George Williams (2010): The emergence of a �culture of control,� in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 3�9. Open Google Scholar
- Lyon, David (2015): Surveillance after Snowden, Cambridge: Polity. Lyon, David/Kevin Haggerty/Kristie Ball (2014): Introducing surveillance studies, Open Google Scholar
- in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 1�11. Open Google Scholar
- MacAskill, Ewen (2015): The NSA�s bulk metadata collection authority just expired. What now?, in: The Guardian, 11/28/2015, available at: http://www.theguardian.com/us-news/2015/nov/28/nsa-bulk-metadata-collection-expires-usa-freedom-act [accessed: 05/29/2016]. Open Google Scholar
- Mason, Alpheus Thomas (1946): Brandeis. A free man�s life, New York: Viking Press. Open Google Scholar
- McCullagh, Declan (2006): FBI taps cell phone mic as eavesdropping tool, available at: http://www.cnet.com/news/fbi-taps-cell-phone-mic-as-eavesdropping-tool/ [accessed: 04/16/16]. Open Google Scholar
- McCulloch, Jude/Sharon Pickering (2010): Counter-terrorism. The law and policing of pre-emption, in: in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 13�29. Open Google Scholar
- McGarrity, Nicola/George Williams (2010): When extraordinary measures become normal. Pre-emption in counter-terrorism and other laws, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 131�149. Open Google Scholar
- McKeown, Ryder (2009): Norm Regress: US Revisionism and the Slow Death of the Torture Norm, in: International Relations, Vol. 23, No. 1, pp. 5�25. Open Google Scholar
- Meister, Andre (2013): Vorratsdatenspeicherung: Warum Verbindungsdaten noch aussagekr�ftiger sind als Kommunikationsinhalte, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 229�233. Open Google Scholar
- Miller, Russel (2017): A Rose by any Other Name? The Comparative Law of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 63�94. Open Google Scholar
- Mills, Jon L. (2015): The Future of Privacy in the Surveillance Age, in: After Snowden. Privacy, Secrecy, and Security in the Information Age, Ronald Goldfarb (ed.), New York: St. Martin�s Press, pp. 191�260. Open Google Scholar
- Moechel, Erich (2013): Was Metadaten der NSA verraten, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 241�244. Open Google Scholar
- Montgomery, Bruce (2008): The Bush-Cheney Administration�s Assault on Open Government, Westport: Praeger. Open Google Scholar
- Mui�nieks, Nils (2015): Europe is spying on you, in: The New York Times, 10/27/2015, available at: http://www.nytimes.com/2015/10/28/opinion/europe-is-spying-on-you-mass-surveillance.html?_r=0 [accessed: 05/23/2015]. Open Google Scholar
- Mui�nieks, Nils (2013): Prism: secret surveillance could destroy democracy rather than defend it, in: The Guardian, 06/26/2013, available at: http://www.coe.int/en/web/commissioner/-/prism-secret-surveillance-could-destroy-democracy-rather-than-defend-it [accessed: 05/23/2016]. Open Google Scholar
- Nakashima, Ellen/Jobby Warrick (2013): For NSA chief, terrorist threat drives passion to �collect it all�, in: The Washington Post, 07/14/2013, available at: https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html [accessed: 06/08/2016]. Open Google Scholar
- Newell, Jim (2013): Thousands gather in Washington for anti-NSA �Stop Watching Us� rally, in: The Guardian, 10/26/2013, available at: http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden [accessed: 06/08/2016]. Open Google Scholar
- Nielsen, Richard/Beth Simmons (2015): Rewards for Ratification: Payoffs for Participating in the International Human Rights Regime?, in: International Studies Quarterly, Vol. 59, No. 2, pp. 197�208. Open Google Scholar
- Nissenbaum, Helen (2010): Privacy in Context. Technology, Policy, and the Integrity of Social Life, Stanford: Stanford University Press. Open Google Scholar
- Nyst, Carly/Tomaso Falchetta (2017): The Right to Privacy in the Digital Age, in: Journal of Human Rights Practice, Vol. 9, No. 1, pp. 104�118. Open Google Scholar
- Obama, Barack (2014): Remarks on Review of Signals Intelligence, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 318�330. Open Google Scholar
- O�Connel, Mary Ellen (2012): Cyber Security without Cyber War, in: Journal of Conflict and Security Law, Vol. 17, No. 2, pp. 187�209. Open Google Scholar
- On the Issue (n.d.): George W. Bush on Technology, available at: http://www.ontheissues.org/Celeb/George_W__Bush_Infrastructure.htm [accessed: 05/03/2016]. Open Google Scholar
- Opitz, Sven/Ute Tellmann (2011): Katastrophale Szenarien: Gegenw�rtige Zukunft in �konomie und Recht, in: Sichtbarkeitsregime. �berwachung, Sicherheit und Privatheit im 21. Jahrhundert, Leon Hempel et al. (eds.), Wiesbaden: VS Verlag f�r Sozialwissenschaften, pp. 27�52. Open Google Scholar
- Organization for Economic Co-Operation and Development (2013): The OECD Privacy Framework, available at: http://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf [accessed: 01/20/2016]. Open Google Scholar
- Organization for Economic Co-Operation and Development (1997): Recommendation of the Council concerning guidelines for cryptography policy, available at: http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=C(97)62/FINAL&docLanguage=En [accessed: 01/20/2016]. Open Google Scholar
- Organization for Economic Co-Operation and Development (1980): OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at: http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm [accessed: 01/18/2016]. Open Google Scholar
- Panke, Diana/Ulrich Petersohn (2016): Norm challenges and norm death: The inexplicable?, in: Cooperation and Conflict, Vol. 51, No. 1, pp. 3�19. Open Google Scholar
- Peters, Anne (2017): Privacy, Rechtsstaatlichkeit, and the Legal Limits on Extraterritorial Surveillance, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 145�179. Open Google Scholar
- P�schl, Magdalena (2015): Sicherung grund- und menschenrechtlicher Standards gegen�ber neuen Gef�hrdungen durch private und ausl�ndische Akteure, in: �ffnung der �ffentlich-rechtlichen Methode durch Internationalit�t und Interdisziplinarit�t: Erscheinungsformen, Chancen, Grenzen ; Referate und Diskussionen auf der Tagung der Vereinigung der Deutschen Staatsrechtslehrer in D�sseldorf vom 1. bis 4. Oktober 2014, Hans Christian R�hl et al. (eds.), Berlin: de Gruyter, pp. 405�452. Open Google Scholar
- Prosser, William (1960): Privacy, in: California Law Review, Vol. 48, No. 3, pp. 383�423. Open Google Scholar
- Reagan, Priscilla M. (2014): Regulating surveillance technologies. Institutional arrangements, in: Routledge Handbook of Surveillance Studies, Kristie Ball et. al. (ed.), Abingdon: Routledge, pp. 397-404. Open Google Scholar
- Rebinger, Simon (2017): Datensch�tzer r�tseln: Schafft Trump Datenschutz-Abkommen zwischen USA und EU ab?, 01/27/2017, available at: https://netzpolitik.org/2017/datenschuetzer-raetseln-schafft-trump-datenschutz-abkommen-zwischen-usa-und-eu-ab/ [accessed: 09/07/2017]. Open Google Scholar
- Reilly, Mollie (2013): Obama Defends NSA Surveillance Program, Says It�s �Transparent,� in: The Huffington Post, 06/18/2013, available at: http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html [accessed: 05/28/2016]. Open Google Scholar
- Restore the Fourth (2015): Who we are, 12/05/2015, available at: https://restorethe4th.com/who-we-are/ [accessed: 06/08/2016]. Open Google Scholar
- Risen, James (2013): Snowden Says He Took No Secret Files to Russia, in: The New York Times, 10/17/2013, available at: http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-to-russia.html?_r=0&mtrref=undefined&gwh=8BB37884F4339E8D704EFD583EF66B2E&gwt=pay [accessed: 05/28/2016]. Open Google Scholar
- Risen, James/Eric Lichtblau (2005): Bush Lets US Spy on Callers Without Courts, in: The New York Times, 12/16/2005, available at: http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html [accessed: 05/04/2016]. Open Google Scholar
- Risse, Thomas et al. (eds.) (2013): The Persistent Power of Human Rights. From Commitment to Compliance, New York: Cambridge University Press. Open Google Scholar
- Risse, Thomas et al. (eds.) (1999): The Power of Human Rights. International Norms and Domestic Change, New York: Cambridge University Press. Open Google Scholar
- R�ssler, Beate (2001): Der Wert des Privaten, Frankfurt a.M.: Suhrkamp. Open Google Scholar
- Roth, Anna-Lena/Florian Gathmann (2013): Merkel zur Handy-Aff�re: �Aussp�hen unter Freunden � das geht gar nicht�, in: Spiegel Online, 10/24/2013, available at: http://www.spiegel.de/politik/deutschland/handy-spaehaffaere-um-merkel-regierung-ueberprueft-alle-nsa-erklaerungen-a-929843.html [accessed: 05/20/2016]. Open Google Scholar
- Rouseff, Dilma (2013): Statement to United Nations General Assembly, in: The Snowden Reader, David Fidler (ed.), Bloomington: Indiana University Press, pp. 158�159. Open Google Scholar
- Rudl, Thomas (2016): EU-US-Datenschutzschild: Irische Datensch�tzer reichen Nichtigkeitsklage ein, 10/27/2016, available at: https://netzpolitik.org/2016/eu-us-datenschutzschild-irische-datenschuetzer-reichen-nichtigkeitsklage-ein/ [accessed: 09/07/2017]. Open Google Scholar
- Rudl, Thomas (2015): Snowden-Dokumente best�tigen Echelon-Programm: R�ckschau auf 40 Jahre Aufdeckungsarbeit, 08/06/2015, available at: https://netzpolitik.org/2015/snowden-dokumente-bestaetigen-echelon-programm-rueckschau-auf-40-jahre-aufdeckungsarbeit/ [accessed: 04/29/2016]. Open Google Scholar
- Ruhmann, Ingo (2014): NSA, IT-Sicherheit und die Folgen, in: Datenschutz und Datensicherheit, No. 1/2014, pp. 40�46. Open Google Scholar
- Rule, James (2014): �Needs� for surveillance and the movement to privacy, in: Routledge Handbook of Surveillance Studies, Kristie Ball et al. (eds.), Abingdon: Routledge, pp. 64�71. Open Google Scholar
- Sales, Allice (2015): Brazil Shows How Not to Respond to Snowden Revelations, in: Panam Post, 02/24/2015, available at: https://panampost.com/alice-salles/2015/02/24/brazil-shows-how-not-to-respond-to-snowden-revelations/ [accessed: 05/15/2016]. Open Google Scholar
- Schaar, Peter (2013): Welche Konsequenzen haben PRISM und Tempora f�r den Datenschutz in Deutschland und Europa?, in: �berwachtes Netz. Edward Snowden und der gr��te �berwachungsskandal der Geschichte, Markus Beckendahl/Andre Meister (eds.), Berlin: newthinking communications, pp. 118�127. Open Google Scholar
- Schariatmadari, David (2015): Privacy is starting to seem like a very 20th-century anomaly, in: The Guardian, 11/07/2015, available at: http://www.theguardian.com/commentisfree/2015/nov/07/privacy-seems-20th-century-aberration-but-worth-mourning [accessed: 01/26/2016]. Open Google Scholar
- Scheer, Ursula (2015): Haben die Amerikaner den Deutschen gedroht?, in: Frankfurter Allgemeine Zeitung, 03/20/2015, available at: http://www.faz.net/aktuell/feuilleton/medien/geheimdienste-und-snowden-gabriel-verraet-greenwald-ein-geheimnis-13496416.html [accessed: 05/28/2016]. Open Google Scholar
- Schiedermair, Stephanie (2012): Der Schutz des Privaten als internationales Grundrecht, T�bingen: Mohr Siebeck. Open Google Scholar
- Schmale, Wolfgang/Marie-Theres Tinnefeld (2014): Privatheit im digitalen Zeitalter, Wien: B�hlau. Open Google Scholar
- Schneider, Jens-Peter (2017): Developments in European Data Protection Law in the Shadow of the NSA-Affair, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 539�563. Open Google Scholar
- Schrecker, Ellen (2002): The Age of McCarthyism. A Brief History with Documents, New York: Bedford/St. Martin�s. Open Google Scholar
- Schrecker, Ellen (1998): Many are the Crimes. McCarthyism in America, Princeton: Princeton University Press. Open Google Scholar
- Schwartz, Paul (2013): The EU-U.S. Privacy Collision: A Turn to Institutions and Procedures, in: Harvard Law Review, Vol. 126, pp. 1967�2009. Open Google Scholar
- Schwarz, Frederick (2008): The Church Committee, then and now, in: US National Security, Intelligence and Democracy. From the Church Committee to the War on Terror, Russell Miller (ed.), Abingdon: Routledge, pp. 22�36. Open Google Scholar
- Schweidler, Walter (2014): Der gute Staat. Politische Ethik von Platon bis zur Gegenwart, Wiesbaden: Springer VS. Open Google Scholar
- Scott, Mark (2016): U.S. and Europe in �Safe Harbor� Data Deal, but Legal Fight May Await, in: The New York Times, 02/02/2016, available at: http://www.nytimes.com/2016/02/03/technology/us-europe-safe-harbor-data-deal.html?_r=0 [accessed: 05/19/2016]. Open Google Scholar
- Shance, Scott (2013): No Morsel Too Minuscule for All-Consuming N.S.A., in: The New York Times, 11/02/2013, available at: http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=1&_r=1 [accessed: 05/20/2016]. Open Google Scholar
- Shapiro, Ari (2013): How Obama's Response To NSA Spying Has Evolved, in: NPR, 11/13/2013, available at: http://www.npr.org/sections/itsallpolitics/2013/11/13/245037300/how-obamas-response-to-nsa-spying-has-evolved [accessed: 05/28/2016]. Open Google Scholar
- Sikkink, Kathryn (2013): The United States and torture: does the spiral model work?, in: The Persistent Power of Human Rights. From Commitment to Compliance, Thomas Risse et al. (eds.), New York: Cambridge University Press, pp. 145�163. Open Google Scholar
- Smale, Alison (2015): Germany, Too, Is Accused of Spying on Friends, in: The New York Times, 05/05/2015, available at: http://www.nytimes.com/2015/05/06/world/europe/scandal-over-spying-shakes-german-government.html?_r=0 [accessed: 05/16/2016]. Open Google Scholar
- Solove, Daniel/Paul Schwartz (2009): Privacy, Information and Technology, New York: Wolters Kluwer. Open Google Scholar
- Solove, Daniel (2008): Understanding privacy, Cambridge: Harvard University Press. Open Google Scholar
- Solove, Daniel (2002): Conceptualizing Privacy, in: California Law Review, Vol. 90, No.4, pp. 1087�1155. Open Google Scholar
- Sprenger, Florian (2015): Politik der Mikroentscheidungen: Edward Snowden, Netzneutralit�t und die Architektur des Internets, L�neburg: meson press. Open Google Scholar
- Stratford, Jean Slemmons/Juri Stratford (1998): Data Protection and Privacy in the United States and Europe, in: IASSIST Quarterly, Fall edition, pp. 17�20. Open Google Scholar
- Theoharis, Athan (2011): Abuse of Power. How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11, Philadelphia: Temple University Press. Open Google Scholar
- The White House (2014): Presidential Policy Directive � Signals Intelligence Activities. Presidential Policy Directive/PPD-28, available at: https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-intelligence-activities [accessed: 06/09/2016]. Open Google Scholar
- The White House (2002): President Bush Delivers Graduation Speech at West Point, available at: http://georgewbush-whitehouse.archives.gov/news/releases/2002/06/20020601-3.html [accessed: 04/28/2016]. Open Google Scholar
- Tilly, Charles (1978): From Mobilization to Revolution, Reading: Addison-Wesley Publishing. Open Google Scholar
- United Nations (n.d.): Charter of the United Nations, available at: http://www.un.org/en/sections/un-charter/chapter-i/index.html [accessed: 06/12/2016]. Open Google Scholar
- United Nations General Assembly (2016): Report of the Special Rapporteur on the right to privacy, UN Doc. A/71/368, distributed on 08/30/2016, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/71/368 [accessed: 09/05/2017]. Open Google Scholar
- United Nations General Assembly (2014): Promotion and protection of human rights and fundamental freedoms while countering terrorism. Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, UN Doc. A/69/397, distributed on 09/23/2014, available at: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/69/397 [accessed: 05/17/2016]. Open Google Scholar
- United Nations General Assembly (2013): Resolution 68/167, The Right to Privacy in the Digital Age, 13/18/2013, UN Doc. A/RES/68/167, distributed on 01/21/2014, available at: http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/68/167 [accessed: 05/17/2016]. Open Google Scholar
- United Nations General Assembly (1998): Official Records, Fifty-third session, 7th plenary meeting, 11/211998, UN Doc. A/53/PV.7, available at: http://www.un.org/documents/a53pv7.pdf [accessed: 06/13/2016]. Open Google Scholar
- United Nations General Assembly (1968): Resolution 2450 (XXIII). Human rights and scientific and technological developments, available at: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/244/10/IMG/NR024410.pdf?OpenElement [accessed: 01/17/2016]. Open Google Scholar
- United Nations Human Rights Council (2016): Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, Advanced Unedited Version, UN Doc. A/HRC/31/64, distributed on 03/08/2016, available at: http://www.ohchr.org/EN/Issues/Privacy/SR/Pages/SRPrivacyIndex.aspx [accessed: 05/17/2016]. Open Google Scholar
- United Nations Human Rights Council (2014a): The right to privacy in the digital age. Report of the Office of the United Nations High Commissioner for Human Rights, UN Doc. A/HRC/27/37, distributed on 06/30/2014, available at: http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx [accessed: 05/17/2016]. Open Google Scholar
- United Nations Human Rights Council (2014b): Concluding observations on the fourth periodic report of the United States of America, 04/23/2014, UN Doc. CCPR/C/USA/CO/4, available at: http://www.refworld.org/docid/5374afcd4.html [accessed: 05/18/2016]. Open Google Scholar
- United States Government Publishing Office (2001): Uniting and strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, available at: https://www.gpo.gov/fdsys/pkg/PLAW-107publ56/pdf/PLAW-107publ56.pdf [accessed: 04/19/16]. Open Google Scholar
- Van Schaack, Beth (2014): The United States� Position on the Extraterritorial Application of Human Rights Obligations: Now is the Time for Change, in: International Law Studies, Vol. 90, pp. 20�65. Open Google Scholar
- V�eneky, Silja (2017): Espionage, Security Interests, and Human Rights in the Second Machine Age. NSA Mass Surveillance and the Framework of Public International Law, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 492�507. Open Google Scholar
- Walen, Alec (2017): Forth Amendment Rights for Nonresident Aliens, in: Privacy and Power. A Transatlantic Dialogue in the Shadow of the NSA-Affair, Russel Miller (ed.), Cambridge: Cambridge University Press, pp. 282�303. Open Google Scholar
- Warren, Samuel/Louis Brandeis (1890): The Right to Privacy, in: Harvard Law Review, Vol. 4, No. 5, pp. 193�220. Open Google Scholar
- Weadon, Patrick D. (2009): Sigsaly Story, available at: https://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/sigsaly_story.shtml [Accessed: 01/14/2016]. Open Google Scholar
- Weisselberg, Charles (2010): Constitutional criminal procedure and civil rights in the shadow of the �war on terror.� A look at recent United States decisions and the rhetoric of terrorism, in: Counter-Terrorism and Beyond. The Culture of Law and Justice after 9/11, Nicola McGarrity et al. (eds.), London: Routledge, pp. 71�87. Open Google Scholar
- Westin, Alan (1970): Privacy and Freedom, New York: Ahteneum. Open Google Scholar
- Wiener, Antje (2014): A Theory of Contestation, Heidelberg: Springer. Open Google Scholar
- Winterfeld, Steve/Jason Andress (2013): The Basics of Cyber Warfare. Understanding the Fundamentals of Cyber Warfare in Theory and Practice, New York: Elsevier. Open Google Scholar
- Wheeler, Brian (2004): �This goes no further��, in: BBC news, 03/02/04, available at: http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm [accessed: 04/19/16]. Open Google Scholar
- Wright, David/Reinhard Kreissl (2015): European responses to the Snowden revelations, in: Surveillance in Europe, David Wright/Reinhard Kreissl (eds.), London: Routledge, pp. 6�50. Open Google Scholar
- Zedner, Lucia (2009): Security, New York: Routledge. Open Google Scholar
- Zengerle, Patricia (2013): U.S. lawmakers want sanctions on any country taking in Snowden, in: Reuters, 07/25/2013, available at: http://www.reuters.com/article/us-usa-security-congress-idUSBRE96O18220130725 [accessed: 05/28/2016]. Open Google Scholar
- Zurawski, Nils (2015): Technische Innovationen und deren gesellschaftliche Auswirkungen im Kontext von �berwachung, Schriftenreihe Sicherheit, Nr. 16, Jochen Schiller et al. (eds.), Berlin: Forschungsforum �ffentliche Sicherheit. Open Google Scholar





